The Zurich Protocol

Future of News

The Zurich protocol

They came for the newsroom. It was ready.

Ben Werdmuller

Ben Werdmuller 13 Jan 2026 — 5 min read

There was little warning. Officers tumbled into the newsroom all at once, guns drawn, shouting into the common spaces. In the kitchen, someone was in the middle of drawing an espresso; overflowing coffee and steam began to drip onto the floor. Then, there was silence as the men took tactical positions in corridors and cubicles, opening closed doors and forcing the occupants of privacy rooms onto the main floor.

They lined up the editors first, zip tying their hands together and leading them into vans downstairs. Then they began to gather the rest of the journalists. Laptops were gathered from desks. The server room, such as it was in the wake of zero trust and enterprise cloud services, had its door kicked in, switches and rack servers ripped out of their frames. One IT support engineer objected and found a gun in his face, the safety off, its owner ready to make them into an example.

The people of color were led into one van; the white journalists into another. All were driven away.

The newsroom’s infrastructure was decommissioned that same day. The website was taken offline. Email accounts and cloud storage were trespassed, their contents downloaded for rapid analysis by the authorities using some central AI system; maybe Palantir, maybe something else.

Ostensibly, there would be a trial. In reality, everyone knew, the point was the intimidation, the unpublishing, the detainment of the people responsible for criticism. There was no time for due process, the administration argued. Across newsrooms, universities, activist organizations, there were too many people. As the newsroom sat chained to their seats, being driven to some incarceration center somewhere, they wondered how long it would be before their families knew. How long before the remote journalists were picked up in similar ways, perhaps in front of their children, their homes trashed.

It didn’t take long for the authorities to gain access to the devices they had taken. They forced journalists to open their phones and laptops at gunpoint; they’d all been trained not to use biometric IDs, that nobody could force them to provide their passwords and PINs, but none of that matters when you have a weapon in your face. The hard drives, though encrypted, were unlocked and accessed, the data on them cloned.

They expected to find source information: the identities of people within the government who had leaked information about detainment sites and immigration enforcement activities.

They found nothing.

The files were all gone. The emails were all redacted. The devices were as good as empty.

And no matter what they did, no matter who they threatened, nobody could restore them. Not a single member of the newsroom gave up their private information.

They couldn’t.

And for all they did to bring the website down, they couldn’t stop the journalism. There was no way to take it offline. Within moments, other newsrooms seemed to have become aware of the raid, and were pointing to the articles. Interest had increased, not decreased.

The newsroom had planned for this.

For months, all its journalism had been mirrored elsewhere. It had always been available under a Creative Commons license for anyone to republish for free — a model pioneered by ProPublica and then followed by The 19thGristThe Marshall Project and more, which this newsroom had used for years. But in that model, another outlet needed to choose to republish an individual article.

In contrast, this new active mirroring left nothing to chance. An independent group in Switzerland intentionally syndicated all non-profit journalism onto its servers, located in Switzerland and subject to Swiss law, out of reach by the US administration. The pieces were also, after a time delay to account for post-publishing edits, syndicated to IPFS, the censorship-resistant peer-to-peer content delivery network. Together, these measures meant that it was impossible to fully redact American non-profit journalism in the public interest. The website was gone, but the articles lived on.

The group had another purpose. Beyond mirroring the newsroom’s articles, it had access to its cloud storage, its email accounts, its databases, its infrastructure. It maintained independent offsite backups of the site and every custom application, all in Switzerland. And most importantly, it had a kill switch.

When the newsroom was raided, monitoring systems in Switzerland noticed an anomaly and automatically shut down the newsroom’s systems within seconds. Email accounts and cloud storage were drained, information was locked down. Now, it was fully under their control: no-one in the US could compel them to restore it all.

Instead, two people in Switzerland, employed by a Swiss organization, needed to independently determine that it was safe to restore data. They sat in two separate clean, glass offices. To restore the data and systems, they would need to speak to the employees in the US, monitor the sensors and the security footage from the US offices, and make their own decision. If they did determine that it was safe, they would do so quickly, but it was their choice. They had full, independent authority to keep data from the newsroom until they could make that determination.

And in this case, they could not.

Because the newsroom used cloud services with zero trust, with data shared using the principle of least privilege, the seized laptops and servers contained very little usable information. Where they did contain local data, it was encrypted using keys that were kept in Switzerland and withheld with the rest of the cloud-hosted data. There was almost nothing that the authorities could use.

There were collaborators: people on the inside who provided information. Some did it because they truly believed in the administration’s cause; some simply wished to ingratiate themselves to power. Even they could not provide more access to the data; they could not lead authorities to sources or compromise the investigations of other newsrooms. In the event, they were not spared. They, too, rode in the van.

Word spread quickly. Details of the intrusion were saved to an indelible ledger of newsroom raids, violence against journalists, and other threats that was peered with newsrooms worldwide. Notifications were sent to leaders at partner newsrooms within seconds.

Those partner newsrooms — protected by similar remote kill switch with other, similar Swiss groups — were able to access source information that had been set aside in advance so that stories in progress could continue to be reported. Some of those newsrooms were in the US; some were in other countries, so that if every newsroom in the US was compromised, others would still be able to pick up the stories elsewhere.

The people in the van did not disappear. Their names, identities, and job titles were all recorded and broadcast to other newsrooms. There would be pressure for their release. Some of them were dual nationals or foreign citizens, and their respective governments would add to the pressure. It wasn’t going to be an easy road, but the truth would endure. Their sources remained safe. Their work could continue. And it would not be in vain.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.